General
-
Target
4a4dcb3d44b25875a661b16ee7d351a057b43921277b1f44a6b17354bb6936a3.exe
-
Size
89KB
-
Sample
240927-yctnpsyblc
-
MD5
343079476b1636d4c4e56249f83f9187
-
SHA1
d24fdb34ba242b7116f6a3e81501e99090f15c70
-
SHA256
4a4dcb3d44b25875a661b16ee7d351a057b43921277b1f44a6b17354bb6936a3
-
SHA512
ac5eb843ed6b06d1819d0d495ea2faeafda1456078c91b16f24aecc3f72718ebbf47687aaeabf1f7ef10b1a6b47a190e35b29d9bbe49d926ea1a3d2af09034c0
-
SSDEEP
384:tsqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZBiS+8tj9:Wf65K2Yf1jKRpcnuXdEgTK
Behavioral task
behavioral1
Sample
4a4dcb3d44b25875a661b16ee7d351a057b43921277b1f44a6b17354bb6936a3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a4dcb3d44b25875a661b16ee7d351a057b43921277b1f44a6b17354bb6936a3.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
Low3n
192.168.42.7:443
1b08a9557635966a4afb29577a39bcd4
-
reg_key
1b08a9557635966a4afb29577a39bcd4
-
splitter
|'|'|
Targets
-
-
Target
4a4dcb3d44b25875a661b16ee7d351a057b43921277b1f44a6b17354bb6936a3.exe
-
Size
89KB
-
MD5
343079476b1636d4c4e56249f83f9187
-
SHA1
d24fdb34ba242b7116f6a3e81501e99090f15c70
-
SHA256
4a4dcb3d44b25875a661b16ee7d351a057b43921277b1f44a6b17354bb6936a3
-
SHA512
ac5eb843ed6b06d1819d0d495ea2faeafda1456078c91b16f24aecc3f72718ebbf47687aaeabf1f7ef10b1a6b47a190e35b29d9bbe49d926ea1a3d2af09034c0
-
SSDEEP
384:tsqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZBiS+8tj9:Wf65K2Yf1jKRpcnuXdEgTK
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1